|
PROBLEM: The HTML parsing code of Netscape is flawed. A malicious remote website can execute a buffer overflow causing arbitrary code to run. PLATFORM: Red Hat Linux 6.0 i386, alpha, sparc Red Hat Linux 6.1 i386, alpha, sparc Red Hat Linux 6.2 i386, alpha, sparc Red Hat Linux 7.0 i386, alpha DAMAGE: Through the execution of arbitrary code a malicious remote website could gain root access. SOLUTION: Update Netscape, as per Red Hat instructions.
VULNERABILITY The risk is HIGH. The vulnerability has been publicly posted. ASSESSMENT:
[****** Begin Red Hat Advisory ******] --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New Netscape packages available Advisory ID: RHSA-2000:109-05 Issue date: 2000-11-17 Updated on: 2000-11-27 Product: Red Hat Linux Keywords: netscape HTML buffer overflow Cross references: N/A --------------------------------------------------------------------- 1. Topic: New Netscape packages are available that fix a buffer overflow in parsing HTML. It is recommended that all Netscape users update to the fixed packages. 2000-11-27: Added packages for Red Hat Linux 7 for Alpha 2. Relevant releases/architectures: Red Hat Linux 6.0 - i386, alpha, sparc Red Hat Linux 6.1 - i386, alpha, sparc Red Hat Linux 6.2 - i386, alpha, sparc Red Hat Linux 7.0 - i386, alpha 3. Problem description: A buffer overflow exists in Netscape's HTML parsing code. By using specially designed code, a remote website could cause arbitrary code to be run on the local machine. 4. Solution: For each RPM for your particular architecture, run: rpm -Fvh [filename] where filename is the name of the RPM. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 20415 - Netscape segfault - cured in 4.76 20462 - Netscape 4.75 buffer overflow 6. RPMs required: Red Hat Linux 6.0: i386: ftp://updates.redhat.com/6.0/i386/netscape-common-4.76-0.6.2.i386.rpm ftp://updates.redhat.com/6.0/i386/netscape-communicator-4.76-0.6.2.i386.rpm ftp://updates.redhat.com/6.0/i386/netscape-navigator-4.76-0.6.2.i386.rpm sources: ftp://updates.redhat.com/6.0/SRPMS/netscape-4.76-0.6.2.src.rpm Red Hat Linux 6.1: i386: ftp://updates.redhat.com/6.1/i386/netscape-common-4.76-0.6.2.i386.rpm ftp://updates.redhat.com/6.1/i386/netscape-communicator-4.76-0.6.2.i386.rpm ftp://updates.redhat.com/6.1/i386/netscape-navigator-4.76-0.6.2.i386.rpm sources: ftp://updates.redhat.com/6.1/SRPMS/netscape-4.76-0.6.2.src.rpm Red Hat Linux 6.2: alpha: ftp://updates.redhat.com/6.2/alpha/netscape-common-4.76-0.6.2.alpha.rpm ftp://updates.redhat.com/6.2/alpha/netscape-communicator-4.76-0.6.2.alpha.rpm ftp://updates.redhat.com/6.2/alpha/netscape-navigator-4.76-0.6.2.alpha.rpm i386: ftp://updates.redhat.com/6.2/i386/netscape-common-4.76-0.6.2.i386.rpm ftp://updates.redhat.com/6.2/i386/netscape-communicator-4.76-0.6.2.i386.rpm ftp://updates.redhat.com/6.2/i386/netscape-navigator-4.76-0.6.2.i386.rpm sources: ftp://updates.redhat.com/6.2/SRPMS/netscape-alpha-4.76-0.6.2.src.rpm ftp://updates.redhat.com/6.2/SRPMS/netscape-4.76-0.6.2.src.rpm Red Hat Linux 7.0: alpha: ftp://updates.redhat.com/7.0/alpha/netscape-common-4.76-1.alpha.rpm ftp://updates.redhat.com/7.0/alpha/netscape-communicator-4.76-1.alpha.rpm ftp://updates.redhat.com/7.0/alpha/netscape-navigator-4.76-1.alpha.rpm i386: ftp://updates.redhat.com/7.0/i386/netscape-common-4.76-1.i386.rpm ftp://updates.redhat.com/7.0/i386/netscape-communicator-4.76-1.i386.rpm ftp://updates.redhat.com/7.0/i386/netscape-navigator-4.76-1.i386.rpm sources: ftp://updates.redhat.com/7.0/SRPMS/netscape-alpha-4.76-1.src.rpm ftp://updates.redhat.com/7.0/SRPMS/netscape-4.76-1.src.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 70e2a3b0e97bd39cf5041ed4abacda98 6.0/SRPMS/netscape-4.76-0.6.2.src.rpm b4a875d94e0947b16b9a973d23f6222b 6.0/i386/netscape-common-4.76-0.6.2.i386.rpm fcde6218d7de0e9e009892c57e7f88ca 6.0/i386/netscape-communicator-4.76-0.6.2.i386.rpm 670b08cbad1097f4ca923071c202b5dd 6.0/i386/netscape-navigator-4.76-0.6.2.i386.rpm 70e2a3b0e97bd39cf5041ed4abacda98 6.1/SRPMS/netscape-4.76-0.6.2.src.rpm b4a875d94e0947b16b9a973d23f6222b 6.1/i386/netscape-common-4.76-0.6.2.i386.rpm fcde6218d7de0e9e009892c57e7f88ca 6.1/i386/netscape-communicator-4.76-0.6.2.i386.rpm 670b08cbad1097f4ca923071c202b5dd 6.1/i386/netscape-navigator-4.76-0.6.2.i386.rpm 70e2a3b0e97bd39cf5041ed4abacda98 6.2/SRPMS/netscape-4.76-0.6.2.src.rpm 924dec1cde5eba83655c1aa1f93bad39 6.2/SRPMS/netscape-alpha-4.76-0.6.2.src.rpm acbb0bcbca33eb41e396a9c7013e2d3d 6.2/alpha/netscape-common-4.76-0.6.2.alpha.rpm 5709be8e1656a2eff9fafe719f5528d2 6.2/alpha/netscape-communicator-4.76-0.6.2.alpha.rpm 9aa6f256592c3f96ee60c57b879618b2 6.2/alpha/netscape-navigator-4.76-0.6.2.alpha.rpm b4a875d94e0947b16b9a973d23f6222b 6.2/i386/netscape-common-4.76-0.6.2.i386.rpm fcde6218d7de0e9e009892c57e7f88ca 6.2/i386/netscape-communicator-4.76-0.6.2.i386.rpm 670b08cbad1097f4ca923071c202b5dd 6.2/i386/netscape-navigator-4.76-0.6.2.i386.rpm 81e1c3e9673ab1e2b498cf3fdaeabcc5 7.0/SRPMS/netscape-4.76-1.src.rpm 7faa76eb6405f45aeb6c41380b833967 7.0/SRPMS/netscape-alpha-4.76-1.src.rpm 199832fec88401961e33203adf3a27c2 7.0/alpha/netscape-common-4.76-1.alpha.rpm 29848ea9545c21d3bb0d8318265fd918 7.0/alpha/netscape-communicator-4.76-1.alpha.rpm 1f27bf46ccf8c7d0bfa7106240cc8174 7.0/alpha/netscape-navigator-4.76-1.alpha.rpm 3bb98e22f094236211955579c7ce49ad 7.0/i386/netscape-common-4.76-1.i386.rpm fc03263dbbbe7f8f1031200d9a8e2022 7.0/i386/netscape-communicator-4.76-1.i386.rpm 3a12fb2d8d0187c7d3684b2a7cf4a9fc 7.0/i386/netscape-navigator-4.76-1.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksigIf you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg 8. References: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc Copyright(c) 2000 Red Hat, Inc. [****** End Red Hat Advisory ******]
Voice: +1 925-422-8193 (7 x 24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@llnl.gov World Wide Web: http://www.ciac.org/ http://ciac.llnl.gov (same machine -- either one will work) Anonymous FTP: ftp.ciac.org ciac.llnl.gov (same machine -- either one will work)